Interaction in public and social spaces

Assignment Help Basic Computer Science
Reference no: EM131578482

Think about the ways that mobile technologies affect interaction in public and social spaces. Spend one full hour in a subway observing people on their mobile devices. Take notes on what you observe. Where possible, capture images for your documentation, but don't cross a line with people's privacy. Refer to the Rodger's chapter on Observing Technology in Use listed in Module 1.

Develop a concept for a technology that makes interactions on the subway more interesting. It might be about how people interact with each other (if that really happens) or maybe how people interact with the MTA or advertising... No limits here except your creativity. Describe the problem/opportunity, explain the apps benefits, how it works/functionality/user experience, what it looks like. Provide a rationale for your design choices. Include one or two sketches/images of how the application works. I'd encourage you to work in pairs.

Reference no: EM131578482

Questions Cloud

Review federal juvenile delinquency code : Federal Juvenile Delinquency Code and Determine the Appropriate Forum for Prosecution
Debt and equity-construction of a new fertilizer plant : The Simla Corporation is considering how to finance its latest project, construction of a new fertilizer plant.
Determine the probability that a donut will fall : The owner of the shop could use a z score to determine the probability that a donut will fall between the acceptable size limits or standard deviations.
Mockups of how your solution would be installed in the space : Incorporate the principles of universal design in your proposal. Provide images or a model of the original space and mockups of how your solution.
Interaction in public and social spaces : Think about the ways that mobile technologies affect interaction in public and social spaces. Spend one full hour in a subway observing people on their mobile.
Pressure from either supplier power or threat of substitutes : Find a company that has to deal with significant pressure from either supplier power or threat of substitutes
What principles of internal control were violated : Scenario: Daisey Company is a very profitable small business. What principles of internal control were violated in this case
Survived back then without technology : Provide an explanation on how people survived back then without technology?
Find the probability of exactly three heads : What is the probability of exactly three heads when you flip a coin five times? What is the probability of three or more heads when you flip a coin five times?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a program that will calculate the daily pay

Using a loop, create a program that will calculate the daily pay and total pay assuming you get paid 1 penny the first day and then double every day after the first day. Display these numbers in a listbox. Use a inputbox to ask the user how many d..

  Simulate a shading model

Using a 3-D modeler, print or plot pictorial wireframe views from at least three different quadrants (i.e., front/top/right side faces, back/bottom/left side faces, etc.) of models you have made.

  What is the kyoto protocol

Read the attached short article from The Economist magazine. Address the following questions. 1. What is the Kyoto Protocol? When does it become outdated? What is the current state of international negotiations on climate change?

  How many rivets are required for the assembly

What is the part number of the Inner Plate? How many rivets are required for the assembly?

  Contrast the ideas of virtual memory and virtual machines

Compare and contrast the ideas of virtual memory and virtual machines. How do the goals of each compare? What are the pros and cons of each? List a few cases where virtual memory is desired, and a few cases where virtual machines are desired.

  Determining the troubleshooting tables

Imagine that an associate of yours just designed a table with captions outside the table's borders.

  Velocity of the particle for the specific value

Find the magnitude of the velocity of the particle for the specific value of t.The magnitude is approximately nothing.(Type an integer or decimal rounded to two decimal places as needed.)

  What are common web application vulnerabilities

What are common web application vulnerabilities, and how can you harden your applications against these?

  Categorical or quantitative variable

In Physical Education class, the teacher has them count off by two's to divide them into teams. Is this a categorical or quantitative variable?

  Describe the scope and analyze how to control the scope

Describe the project including the describe the scope and analyze how to control the scope and identify possible risks, constraints, and assumptions.

  Algorithm to find the minimum vertex cover

How to use hill climbing algorithm to find the minimum vertex cover for an undirected graph? Any idea about the algorithm and implementation in C language? Thanks.

  Write an algorithm for the hangman game

1 Write an Algorithm for the Hangman game(include step by step instructions for the game)2 Variable list for Hangman    Variable Name           Data Type        What it holds

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd